Forums before death by AOL, social media and spammers... "We can't have nice things"
|    alt.os.development    |    Operating system development chatter    |    4,255 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 2,599 of 4,255    |
|    mutazilah@gmail.com to Scott Lurndal    |
|    Re: drivers    |
|    14 Jul 21 15:35:11    |
      From: muta...@gmail.com              On Thursday, July 15, 2021 at 7:04:02 AM UTC+10, Scott Lurndal wrote:              > Yes, they've a simple solution. The firmware is       > cryptographically signed. It can only be loaded if       > the signature is signed by the private key associated       > with the public key stored in the TPM.              Wow. They've gone to a lot of effort to keep me away.              I wonder if they've also got some spyware in there.       How would that be done? Perhaps the bluetooth       receiver is detecting an incoming request, and if       the ID is CIA_HERE_FOR_YOU it sets up its own       connection and dumps whatever it wants from my       hard disk. They've already got FAT-32 code in there.       I'm using NTFS, but no reason why they can't add       that too.              I don't suppose the Chinese have put this firmware       anywhere near their nukes so that the Free World       can rock up with a bluetooth device and disable them all?              Ok, so if I have my own x64 computer-controlled nuclear       arsenal, and I want some non-CIA-controlled firmware,       this is my only option:              https://www.pcengines.ch/apu.htm              and I even have to supply my own case?              There's no drive from even the Chinese themselves to       have some open firmware?              Thanks. Paul.              --- SoupGate-Win32 v1.05        * Origin: you cannot sedate... all the things you hate (1:229/2)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca